Download A Practical Guide to TPM 2.0: Using the Trusted Platform by Will Arthur, David Challener, Kenneth Goldman PDF

By Will Arthur, David Challener, Kenneth Goldman

A pragmatic advisor to TPM 2.0: utilizing the depended on Platform Module within the New Age of safeguard is a straight-forward primer for builders. It indicates safeguard and TPM techniques, demonstrating their utilization in actual functions that the reader can test out.

Simply placed, this ebook is designed to empower and excite the programming group to move out and do cool issues with the TPM. The technique is to ramp the reader up fast and hold their curiosity. a pragmatic advisor to TPM 2.0: utilizing the depended on Platform Module within the New Age of protection explains safety ideas, describes TPM 2.0 structure, and gives coding examples in parallel starting with extremely simple suggestions and easy code to hugely advanced ideas and code.

The e-book comprises entry to a dwell execution setting (secure, hosted virtualization) and genuine code examples to get readers up and chatting with the TPM quick. The authors then aid the clients extend on that with genuine examples of worthy apps utilizing the TPM.

Show description

Read or Download A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security PDF

Similar security books

Military Leadership in the British Civil Wars, 1642-1651

Несмотря на богатство литературы по истории британских гражданских войн, рассматривающей проблемы религии и экономики, локальные и или конституционные, немного работ посвящено эффективности военного командования в деле итоговой победы парламента. Это исследование синтезирует элементы анализа военного руководства в предлагаемую модель, включающую последовательно: моральный авторитет, агрессивность и военное превосходство, изменяющиеся под влиянием поведения, человеческой динамики и контекста.

ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings

This booklet constitutes the refereed lawsuits of the thirtieth IFIP TC eleven overseas details safety and privateness convention, SEC 2015, held in Hamburg, Germany, in may perhaps 2015. The forty two revised complete papers awarded have been rigorously reviewed and chosen from 212 submissions. The papers are equipped in topical sections on privateness, internet safeguard, entry keep an eye on, belief and identification administration, community safety, protection administration and human points of defense, software program protection, utilized cryptography, cellular and cloud providers protection, and cyber-physical platforms and important infrastructures safety.

Additional resources for A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security

Sample text

Many interesting scenarios are enabled by this, including these: u A VPN may not allow a PC access to a network unless it can prove it’s running approved IT software. u A file system may not obtain its encryption key unless its MBR has not been disturbed and the hard disk is on the same system. Privacy Enablement The architects of the first TPM were very concerned about privacy. Privacy is of major importance to enterprises, because losing systems or data that contain personally identifiable information (PII) can cause an enormous loss of money.

Second, the TPM performs under-the-covers TPM context management by using the TPM context save and load commands. This allows TBS to present each application with a virtual TPM that appears to have essentially unlimited resources like key slots, and ensures that one application cannot interfere with the keys or slots created by another. Third, TPM commands are submitted via a TBS context, and TBS automatically cleans up resources when the context is closed or the process dies. Windows also layers additional security mechanisms on top of the TPM’s administrative controls.

Cout << "Random bytes: " << rand << endl; return; } All of these interfaces work, but of course some, such as TBS, are specific to the Windows OS. If you want to write programs that are portable to other OSs, you are better off with one of the others. 2, TSS was the interface with the broadest OS adoption. The next section considers an application that was written using TSS to take advantage of advanced TPM functions. Wave Systems Embassy Suite Wave Systems has written software to a TPM-specific interface, rather than to a higher-level interface such as PKCS #11.

Download PDF sample

Rated 4.90 of 5 – based on 45 votes